Position: Home page » Blockchain » Blockchain technology data sharing

Blockchain technology data sharing

Publish: 2021-04-19 21:26:37
1.

blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. Blockchain is an important concept of bitcoin,

in essence, it is a decentralized database. At the same time, as the underlying technology of bitcoin, it is a series of data blocks generated by using cryptographic methods. Each data block contains a batch of information of bitcoin network transactions, Used to verify the validity of its information (anti-counterfeiting) and generate the next block

extended data

most blockchain public chains are limited by scalability. The biggest feature of blockchain technology is decentralization, which requires that all accounts in the network need to deal with the accounting process. Distributed accounting has high security, low misoperation rate, political neutrality and correctness

however, blockchain technology embraces these features at the same time, sacrificing scalability, unable to meet the personalized supervision, and slightly insufficient in protecting data privacy. Moreover, with the increase of the number of ledger, the interaction delay will increase exponentially, that is to say, the more ledger in the blockchain network, the higher the delay

2. Of course, this is OK
first of all, blockchain is actually a centralized database or a decentralized database, and all technical units are for better maintenance of the public database. Each node keeps a of data independently. Consensus algorithm is used to achieve the data consistency of the node's account book, and cryptographic algorithm is used to ensure the data can not be tampered, and the data can not be tampered and the security of data sending and receiving; Through the script system, the expression scope of account data is expanded
secondly, financial sharing center involves a large amount of financial data. We can combine the technical characteristics of blockchain with Financial Sharing Center. Next, I will combine the technical characteristics of blockchain with Financial Sharing Center
① distributed storage is a distributed database of the blockchain, and each node keeps a of the data independently. If this is combined with the Financial Sharing Center, The users who can join the "financial data on the chain" in the financial sharing chain are equivalent to the "nodes" in the blockchain network, and each user can keep a of the financial data separately, so as to achieve the purpose of sharing
② tampering is not allowed. A very important feature of blockchain technology is that the data cannot be tampered, To ensure the security of a data in the Financial Sharing Center, we need to consider the security as long as the financial data is involved.
of course, before doing the Financial Sharing Center, you must determine your specific needs, if necessary, first write a framework of the whole project, and then find a formal blockchain development team according to the needs, To help you develop this "Financial Sharing Center", we must pay attention to that before formal cooperation is reached, don't disclose the information of your project casually, in order to prevent the same kind from being copied.
3. In view of the security characteristics and shortcomings of the existing blockchain technology, we need to build a security system around the physical, data, application system, encryption, risk control and other aspects to improve the security performance of the blockchain system as a whole
1. Physical security
the network and host running the blockchain system should be in a protected environment. According to the regulatory requirements of specific business, the protection measures can be used to protect the physical network and host by means of VPN, firewall, physical isolation, etc
2. Data security
in principle, the data exchange between nodes of the blockchain should not be transmitted in clear text. For example, asymmetric encryption can be used to negotiate key, and symmetric encryption algorithm can be used to encrypt and decrypt data. The data provider should also strictly evaluate the sensitivity and security level of the data, decide whether to send the data to the blockchain, whether to desensitize the data, and adopt strict access control measures
3. Application system security
application system security needs to start from the aspects of identity authentication, authority system, transaction rules, anti fraud strategy, etc.
relevant personnel, transaction nodes and transaction data involved in application operation should be controlled in advance and auditable afterwards. Taking financial blockchain as an example, consensus algorithm with stronger fault tolerance, anti fraud and higher performance can be adopted to avoid joint fraud of some nodes
4. Key security
to encrypt the communication data between the blockchain nodes and the key to encrypt the data stored on the blockchain nodes, the plaintext should not exist on the same node, and the private key should be properly saved by the encryption machine. When the key is lost or leaked, the system can identify the relevant records of the original key, such as account control, communication encryption, data storage encryption, etc., and implement response measures to make the original key invalid. The key should also be managed strictly in the life cycle, and should not be permanently valid. It needs to be replaced after reaching a certain time cycle
5. Risk control mechanism
there should be careful detection measures for the network layer, host operation, data access of application system, transaction frequency and other dimensions of the system. For any suspicious operation, alarm, record and verification should be carried out. If illegal operation is found, loss assessment should be carried out, remedial measures should be taken at the technical and business levels, and security measures should be strengthened, And trace the source of illegal operation to prevent further attacks

Article source: white paper on blockchain technology and application development in China
4. China State Grid Corporation is seeking blockchain technology to advance its "energy Internet" program
in a patent application submitted to China's State Intellectual Property Office last November and released last week, the energy giant explored blockchain driven systems in detail, saying that they can store and track consumers' power consumption and share data in a decentralized way. Bt110
5. Information sharing is the key. The blockchain technology is becoming more and more mature. You can understand the ecological agreement, and the tea instry will have a broader development space
6. Chongqing jinwowo analyzes and solves problems in the following ways:
first of all, by using all data chains in the blockchain for prediction and analysis, the regulatory authorities can timely discover and prevent possible systemic risks. The decentralized characteristics of the blockchain can eliminate the information island in big data risk control, and improve risk control through information sharing

secondly, the distributed database of blockchain can improve the poor quality of big data risk control data, and solve the problems of data format diversification, data form fragmentation, lack of effective data and incomplete data content

finally, blockchain can prevent data leakage. Because the blockchain database is a decentralized database, any node's operation on data will be found by other nodes, thus strengthening the monitoring of data leakage.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750